state or cache for performance. Attackers know this design practice and will
regularly inspect client-side cache and storage for any remnants of
sensitive data when reverse engineering apps. Desirable sensitive data
includes authentication tokens and session data that can be useful to
attackers attempting session hijacking or account takeover ATO . If you
must store data client-side, use hardware-backed cryptographically secure
storage to do so. APIs to interface with device-level hardware and encrypt
data appropriately are provided by the respective OS vendor and should
also be provided to engineering teams.
4.
Dostları ilə paylaş: